Next century challenges: mobile networking for “Smart Dust”
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
On a Construction of Short Digests for Authenticating Ad Hoc Networks
ICCSA '09 Proceedings of the International Conference on Computational Science and Its Applications: Part II
An efficient access control model for mobile ad-hoc communities
SPC'05 Proceedings of the Second international conference on Security in Pervasive Computing
Practical schemes for privacy and security enhanced RFID
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
SecureSafe: a highly secure online data safe industrial use case
Proceedings of the First Workshop on Measurement, Privacy, and Mobility
SP'11 Proceedings of the 19th international conference on Security Protocols
Trustworthiness and authentication in ubiquitous computing
Proceedings of the 10th ACM international symposium on Mobility management and wireless access
Hi-index | 0.00 |
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of an online authentication server. We introduced the Resurrecting Duckling security policy model to address this problem. Master-slave relationships, however, do not exhaust the range of interesting interactions. We therefore extend the Duckling model to also cover relationships between peers.